------SNIP--------------------


Ed,

Could he mean adding the library to apf list?

Ed

     Ed Jaffe snipped too much.  Take a look at more of Gil's post:

On the other hand, anyone who worked at the same shop for a long time knows how to "trick" its systems. How to run jobs with any jobclass (and maybe form some kind of a denial of service attack?), how passwords are managed, who are the powerful users, what resources are not properly protected, how to falsify identities under CICS/IMS, how to run batch jobs under other
users, how to become APF-authorized, how to utilize error in 3rd party
products, and the list goes on

Once you know which power users (sysprog or RACF SPECIAL) don't log off when they leave their desks, it doesn't take long to get the access you need to APF datasets. If you know of flaws that let you submit jobs to run under a power user's userid, again you can do just about anything.

Hmmm.. I never needed that authority and I was a lead. Besides we had TPX and if I left my desk after 5 minutes anyone needed my password to get to my ID. I was usually in the computer room then and just stole my session to there (another great feature of TPX). The AUDITOR was one of the two people that had a special ID. The other was in a locked cabinet for emergencies. All hell broke loose if anyone used it. The auditor and I were good friends and I even had him locked out of my datasets, this was TSO only of course. Even so, I ran ACF2 reports daily to see who tried to access my datasets. People knew it and would stay away.


I was going to mention some more of my favorite methods I know of for getting passwords or getting jobs run under others' userids. I decided it was not a good idea to publicize them. The above are quite general. (Not that I made use of those methods; it was enough for me to know they worked, and to try to plug the holes.)

     Basically, as others have said:
1.  Security is a process; and
2.  usually, the biggest security hole is people.


Agreed but again it maybe installation dependent. Some installations, IMO, are loosey goosey and others are by the rules

Ed

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to